摘要:
A method includes a network originating a QoS reservation message and communicating the network-originated QoS message through a radio access network (RAN) from an access gateway (AGW) to an access terminal (AT). The network-originated reservation message does not cause any network resource reservation by itself, but causes the AT to initiate a network resource reservation according to one or more parameters in the network-originated QoS reservation message. Accordingly, an existing network infrastructure supporting AT-originated QoS reservation may support network-originated QoS reservation (or proxied QoS) without any updates to an access-network infrastructure, such as the RAN. The method includes, in response to the network-initiated QoS reservation message, communicating a reservation confirmation through the RAN from the AT to the AGW. The reservation confirmation whether that the QoS reservation was successful.
摘要:
A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more application layer elements. The method includes receiving accounting data from one or more lower layer elements, such that the accounting data is associated with the policy data. The method also includes consolidating the accounting data and the policy data received.
摘要:
A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more application layer elements. The method includes receiving accounting data from one or more lower layer elements, such that the accounting data is associated with the policy data. The method also includes consolidating the accounting data and the policy data received.
摘要:
A method for selecting an IP address for an application used in a network environment may include receiving data of a network's capabilities, receiving data of a subscriber's applications, and receiving data of a subscriber's needs. The method may also include generating a policy document, such that the policy document associates an IP address with each application based on the subscriber's needs and the network's capabilities.
摘要:
In one embodiment, a method includes receiving a first message from a first manager. The first message includes a first element of a request for policy authorization. The request for policy authorization attempts to reserve particular network resources for a particular application context. The method includes, in response to the first message, establishing a policy rendezvous state at a policy manager for a policy decision on the request for policy authorization. The method includes receiving a second message from a second manager subsequent to the first message. The second message includes a second element of the request for policy authorization, and the second element completes the request for policy authorization. The method includes, in response to the second message, making the policy decision based on the first and second elements of the request for policy authorization. The method includes, if the policy decision grants the request for policy authorization, generating a complete policy facet and communicating the complete policy facet to the first manager or the second manager to authorize use of the particular resources for the particular application context.
摘要:
Determining a policy output includes facilitating a communication session for an access terminal at a visited network. The access terminal is associated with a home network. A policy is received at a visited policy server of the visited network. The policy has facets that include an application facet that identifies an application deployable in the home network. The application is identified from the application facet, and the policy output is determined in accordance with the application.
摘要:
A method for receiving accounting data from one or more lower layer elements, consolidating the accounting data received, and sending the consolidated accounting data to an accounting receiving function, such that accounting receiving function can be a charging data function and/or a charging gateway function. The accounting receiving function is shielded by mobility events associated with the accounting data. The accounting receiving function is also shielded by the details of different access network accounting formats.
摘要:
A method for creating an accounting record in a communication network may include receiving a SIP message and matching service point triggers with data. The method may also include invoking an application server associated with the service point trigger matched. The method also includes capturing accounting information associated with the invoked application server.
摘要:
A method is provided in one example embodiment and includes receiving a data packet transported on a backhaul link at a first network element; de-capsulating the data packet; identifying whether the data packet is an upstream data packet; identifying whether the data packet matches an internet protocol (IP) access control list (ACL) or a tunnel endpoint identifier; and offloading the data packet from the backhaul link. In more specific embodiment, the method can include identifying that the data packet does not match the IP ACL or the tunnel endpoint identifier; and communicating the data packet to a second network element. In other examples, the method can include identifying that the data packet is a downstream data packet; identifying a service to be performed for the data packet that cannot be performed at the first network element; and communicating the data packet to a second network element.
摘要:
A method is provided in one example embodiment and includes receiving a data packet transported on a backhaul link at a first network element; identifying whether the data packet is an upstream data packet; identifying whether the data packet matches an internet protocol (IP) access control list (ACL) or a tunnel endpoint identifier; performing a network address translation on the data packet; and offloading the data packet from the backhaul link. In certain implementations, the method can include identifying that the data packet does not match the IP ACL or the tunnel endpoint identifier; and communicating the data packet to a second network element. In other instances, the method can include identifying that the data packet is a downstream data packet; and restoring a tunnel header and tunnel identification based on an IP address of the data packet.